3 * StatusNet - the distributed open-source microblogging tool
4 * Copyright (C) 2009-2010, StatusNet, Inc.
6 * This program is free software: you can redistribute it and/or modify
7 * it under the terms of the GNU Affero General Public License as published by
8 * the Free Software Foundation, either version 3 of the License, or
9 * (at your option) any later version.
11 * This program is distributed in the hope that it will be useful,
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 * GNU Affero General Public License for more details.
16 * You should have received a copy of the GNU Affero General Public License
17 * along with this program. If not, see <http://www.gnu.org/licenses/>.
20 if (!defined('STATUSNET')) {
25 * @package OStatusPlugin
26 * @maintainer Brion Vibber <brion@status.net>
30 PuSH subscription flow:
33 generate random verification token
35 sends a sub request to the hub...
38 hub sends confirmation back to us via GET
39 We verify the request, then echo back the challenge.
40 On our end, we save the time we subscribed and the lease expiration
43 hub sends us updates via POST
46 class FeedDBException extends FeedSubException
50 function __construct($obj)
52 parent::__construct('Database insert failure');
58 * FeedSub handles low-level PubHubSubbub (PuSH) subscriptions.
59 * Higher-level behavior building OStatus stuff on top is handled
60 * under Ostatus_profile.
62 class FeedSub extends Memcached_DataObject
64 public $__table = 'feedsub';
69 // PuSH subscription data
73 public $sub_state; // subscribe, active, unsubscribe, inactive
81 public /*static*/ function staticGet($k, $v=null)
83 return parent::staticGet(__CLASS__, $k, $v);
87 * return table definition for DB_DataObject
89 * DB_DataObject needs to know something about the table to manipulate
90 * instances. This method provides all the DB_DataObject needs to know.
92 * @return array array of column definitions
96 return array('id' => DB_DATAOBJECT_INT + DB_DATAOBJECT_NOTNULL,
97 'uri' => DB_DATAOBJECT_STR + DB_DATAOBJECT_NOTNULL,
98 'huburi' => DB_DATAOBJECT_STR,
99 'secret' => DB_DATAOBJECT_STR,
100 'verify_token' => DB_DATAOBJECT_STR,
101 'sub_state' => DB_DATAOBJECT_STR + DB_DATAOBJECT_NOTNULL,
102 'sub_start' => DB_DATAOBJECT_STR + DB_DATAOBJECT_DATE + DB_DATAOBJECT_TIME,
103 'sub_end' => DB_DATAOBJECT_STR + DB_DATAOBJECT_DATE + DB_DATAOBJECT_TIME,
104 'last_update' => DB_DATAOBJECT_STR + DB_DATAOBJECT_DATE + DB_DATAOBJECT_TIME,
105 'created' => DB_DATAOBJECT_STR + DB_DATAOBJECT_DATE + DB_DATAOBJECT_TIME + DB_DATAOBJECT_NOTNULL,
106 'modified' => DB_DATAOBJECT_STR + DB_DATAOBJECT_DATE + DB_DATAOBJECT_TIME + DB_DATAOBJECT_NOTNULL);
109 static function schemaDef()
111 return array(new ColumnDef('id', 'integer',
117 /*auto_increment*/ true),
118 new ColumnDef('uri', 'varchar',
120 new ColumnDef('huburi', 'text',
122 new ColumnDef('verify_token', 'text',
124 new ColumnDef('secret', 'text',
126 new ColumnDef('sub_state', "enum('subscribe','active','unsubscribe','inactive')",
128 new ColumnDef('sub_start', 'datetime',
130 new ColumnDef('sub_end', 'datetime',
132 new ColumnDef('last_update', 'datetime',
134 new ColumnDef('created', 'datetime',
136 new ColumnDef('modified', 'datetime',
141 * return key definitions for DB_DataObject
143 * DB_DataObject needs to know about keys that the table has; this function
146 * @return array key definitions
150 return array_keys($this->keyTypes());
154 * return key definitions for Memcached_DataObject
156 * Our caching system uses the same key definitions, but uses a different
157 * method to get them.
159 * @return array key definitions
163 return array('id' => 'K', 'uri' => 'U');
166 function sequenceKey()
168 return array('id', true, false);
172 * Fetch the StatusNet-side profile for this feed
175 public function localProfile()
177 if ($this->profile_id) {
178 return Profile::staticGet('id', $this->profile_id);
184 * Fetch the StatusNet-side profile for this feed
187 public function localGroup()
189 if ($this->group_id) {
190 return User_group::staticGet('id', $this->group_id);
196 * @param string $feeduri
198 * @throws FeedSubException if feed is invalid or lacks PuSH setup
200 public static function ensureFeed($feeduri)
202 $current = self::staticGet('uri', $feeduri);
207 $discover = new FeedDiscovery();
208 $discover->discoverFromFeedURL($feeduri);
210 $huburi = $discover->getHubLink();
211 if (!$huburi && !common_config('feedsub', 'fallback_hub')) {
212 throw new FeedSubNoHubException();
215 $feedsub = new FeedSub();
216 $feedsub->uri = $feeduri;
217 $feedsub->huburi = $huburi;
218 $feedsub->sub_state = 'inactive';
220 $feedsub->created = common_sql_now();
221 $feedsub->modified = common_sql_now();
223 $result = $feedsub->insert();
224 if (empty($result)) {
225 throw new FeedDBException($feedsub);
232 * Send a subscription request to the hub for this feed.
233 * The hub will later send us a confirmation POST to /main/push/callback.
235 * @return bool true on success, false on failure
236 * @throws ServerException if feed state is not valid
238 public function subscribe($mode='subscribe')
240 if ($this->sub_state && $this->sub_state != 'inactive') {
241 common_log(LOG_WARNING, "Attempting to (re)start PuSH subscription to $this->uri in unexpected state $this->sub_state");
243 if (empty($this->huburi)) {
244 if (common_config('feedsub', 'fallback_hub')) {
245 // No native hub on this feed?
246 // Use our fallback hub, which handles polling on our behalf.
247 } else if (common_config('feedsub', 'nohub')) {
248 // Fake it! We're just testing remote feeds w/o hubs.
249 // We'll never actually get updates in this mode.
252 throw new ServerException(_m('Attempting to start PuSH subscription for feed with no hub.'));
256 return $this->doSubscribe('subscribe');
260 * Send a PuSH unsubscription request to the hub for this feed.
261 * The hub will later send us a confirmation POST to /main/push/callback.
262 * Warning: this will cancel the subscription even if someone else in
263 * the system is using it. Most callers will want garbageCollect() instead,
264 * which confirms there's no uses left.
266 * @return bool true on success, false on failure
267 * @throws ServerException if feed state is not valid
269 public function unsubscribe() {
270 if ($this->sub_state != 'active') {
271 common_log(LOG_WARNING, "Attempting to (re)end PuSH subscription to $this->uri in unexpected state $this->sub_state");
273 if (empty($this->huburi)) {
274 if (common_config('feedsub', 'fallback_hub')) {
275 // No native hub on this feed?
276 // Use our fallback hub, which handles polling on our behalf.
277 } else if (common_config('feedsub', 'nohub')) {
278 // Fake it! We're just testing remote feeds w/o hubs.
279 // We'll never actually get updates in this mode.
282 throw new ServerException(_m('Attempting to end PuSH subscription for feed with no hub.'));
286 return $this->doSubscribe('unsubscribe');
290 * Check if there are any active local uses of this feed, and if not then
291 * make sure it's inactive, unsubscribing if necessary.
293 * @return boolean true if the subscription is now inactive, false if still active.
295 public function garbageCollect()
297 if ($this->sub_state == '' || $this->sub_state == 'inactive') {
298 // No active PuSH subscription, we can just leave it be.
301 // PuSH subscription is either active or in an indeterminate state.
302 // Check if we're out of subscribers, and if so send an unsubscribe.
304 Event::handle('FeedSubSubscriberCount', array($this, &$count));
307 common_log(LOG_INFO, __METHOD__ . ': ok, ' . $count . ' user(s) left for ' . $this->uri);
310 common_log(LOG_INFO, __METHOD__ . ': unsubscribing, no users left for ' . $this->uri);
311 return $this->unsubscribe();
316 protected function doSubscribe($mode)
318 $orig = clone($this);
319 $this->verify_token = common_good_rand(16);
320 if ($mode == 'subscribe') {
321 $this->secret = common_good_rand(32);
323 $this->sub_state = $mode;
324 $this->update($orig);
328 $callback = common_local_url('pushcallback', array('feed' => $this->id));
329 $headers = array('Content-Type: application/x-www-form-urlencoded');
330 $post = array('hub.mode' => $mode,
331 'hub.callback' => $callback,
332 'hub.verify' => 'sync',
333 'hub.verify_token' => $this->verify_token,
334 'hub.secret' => $this->secret,
335 'hub.topic' => $this->uri);
336 $client = new HTTPClient();
338 $hub = $this->huburi;
340 if (common_config('feedsub', 'fallback_hub')) {
341 $hub = common_config('feedsub', 'fallback_hub');
342 if (common_config('feedsub', 'hub_user')) {
343 $u = common_config('feedsub', 'hub_user');
344 $p = common_config('feedsub', 'hub_pass');
345 $client->setAuth($u, $p);
348 throw new FeedSubException('WTF?');
351 $response = $client->post($hub, $headers, $post);
352 $status = $response->getStatus();
353 if ($status == 202) {
354 common_log(LOG_INFO, __METHOD__ . ': sub req ok, awaiting verification callback');
356 } else if ($status == 204) {
357 common_log(LOG_INFO, __METHOD__ . ': sub req ok and verified');
359 } else if ($status >= 200 && $status < 300) {
360 common_log(LOG_ERR, __METHOD__ . ": sub req returned unexpected HTTP $status: " . $response->getBody());
363 common_log(LOG_ERR, __METHOD__ . ": sub req failed with HTTP $status: " . $response->getBody());
366 } catch (Exception $e) {
368 common_log(LOG_ERR, __METHOD__ . ": error \"{$e->getMessage()}\" hitting hub $this->huburi subscribing to $this->uri");
370 $orig = clone($this);
371 $this->verify_token = '';
372 $this->sub_state = 'inactive';
373 $this->update($orig);
381 * Save PuSH subscription confirmation.
382 * Sets approximate lease start and end times and finalizes state.
384 * @param int $lease_seconds provided hub.lease_seconds parameter, if given
386 public function confirmSubscribe($lease_seconds=0)
388 $original = clone($this);
390 $this->sub_state = 'active';
391 $this->sub_start = common_sql_date(time());
392 if ($lease_seconds > 0) {
393 $this->sub_end = common_sql_date(time() + $lease_seconds);
395 $this->sub_end = null;
397 $this->modified = common_sql_now();
399 return $this->update($original);
403 * Save PuSH unsubscription confirmation.
404 * Wipes active PuSH sub info and resets state.
406 public function confirmUnsubscribe()
408 $original = clone($this);
410 // @fixme these should all be null, but DB_DataObject doesn't save null values...?????
411 $this->verify_token = '';
413 $this->sub_state = '';
414 $this->sub_start = '';
416 $this->modified = common_sql_now();
418 return $this->update($original);
422 * Accept updates from a PuSH feed. If validated, this object and the
423 * feed (as a DOMDocument) will be passed to the StartFeedSubHandleFeed
424 * and EndFeedSubHandleFeed events for processing.
426 * Not guaranteed to be running in an immediate POST context; may be run
427 * from a queue handler.
429 * Side effects: the feedsub record's lastupdate field will be updated
430 * to the current time (not published time) if we got a legit update.
432 * @param string $post source of Atom or RSS feed
433 * @param string $hmac X-Hub-Signature header, if present
435 public function receive($post, $hmac)
437 common_log(LOG_INFO, __METHOD__ . ": packet for \"$this->uri\"! $hmac $post");
439 if ($this->sub_state != 'active') {
440 common_log(LOG_ERR, __METHOD__ . ": ignoring PuSH for inactive feed $this->uri (in state '$this->sub_state')");
445 common_log(LOG_ERR, __METHOD__ . ": ignoring empty post");
449 if (!$this->validatePushSig($post, $hmac)) {
450 // Per spec we silently drop input with a bad sig,
451 // while reporting receipt to the server.
455 $feed = new DOMDocument();
456 if (!$feed->loadXML($post)) {
457 // @fixme might help to include the err message
458 common_log(LOG_ERR, __METHOD__ . ": ignoring invalid XML");
462 $orig = clone($this);
463 $this->last_update = common_sql_now();
464 $this->update($orig);
466 Event::handle('StartFeedSubReceive', array($this, $feed));
467 Event::handle('EndFeedSubReceive', array($this, $feed));
471 * Validate the given Atom chunk and HMAC signature against our
472 * shared secret that was set up at subscription time.
474 * If we don't have a shared secret, there should be no signature.
475 * If we we do, our the calculated HMAC should match theirs.
477 * @param string $post raw XML source as POSTed to us
478 * @param string $hmac X-Hub-Signature HTTP header value, or empty
479 * @return boolean true for a match
481 protected function validatePushSig($post, $hmac)
484 if (preg_match('/^sha1=([0-9a-fA-F]{40})$/', $hmac, $matches)) {
485 $their_hmac = strtolower($matches[1]);
486 $our_hmac = hash_hmac('sha1', $post, $this->secret);
487 if ($their_hmac === $our_hmac) {
490 if (common_config('feedsub', 'debug')) {
491 $tempfile = tempnam(sys_get_temp_dir(), 'feedsub-receive');
493 file_put_contents($tempfile, $post);
495 common_log(LOG_ERR, __METHOD__ . ": ignoring PuSH with bad SHA-1 HMAC: got $their_hmac, expected $our_hmac for feed $this->uri on $this->huburi; saved to $tempfile");
497 common_log(LOG_ERR, __METHOD__ . ": ignoring PuSH with bad SHA-1 HMAC: got $their_hmac, expected $our_hmac for feed $this->uri on $this->huburi");
500 common_log(LOG_ERR, __METHOD__ . ": ignoring PuSH with bogus HMAC '$hmac'");
506 common_log(LOG_ERR, __METHOD__ . ": ignoring PuSH with unexpected HMAC '$hmac'");